Author of the publication

Quantum key distribution and cryptography: a survey.

, , , , , , , , , , , , , , , , , , , , , , , and . Classical and Quantum Information Assurance Foundations and Practice, volume 09311 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Thomas Monninger

SCENE : Reasoning About Traffic Scenes Using Heterogeneous Graph Neural Networks, , , , , , , and . IEEE Robotics and automation letters, 8 (3): 1531-1538 (2023)
SCENE : Reasoning About Traffic Scenes Using Heterogeneous Graph Neural Networks, , , , , , , and . IEEE Robotics and automation letters, 8 (3): 1531-1538 (2023)Exploring Navigation Maps for Learning-Based Motion Prediction, , , , and . IEEE International Conference on Robotics and Automation, ICRA 2023, London, UK, May 29 - June 2, 2023, page 3539--3545. IEEE, (2023)Semantic Map Learning of Traffic Light to Lane Assignment based on Motion Data, , and . 25th IEEE International Conference on Intelligent Transportation Systems, ITSC 2022, Macau, China, October 8-12, 2022, page 1583--1590. IEEE, (2023)
 

Other publications of authors with the same name

Using quantum key distribution for cryptographic purposes: A survey., , , , , , , , , and 13 other author(s). Theor. Comput. Sci., (2014)IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange., , and . CRYPTO, volume 3152 of Lecture Notes in Computer Science, page 477-493. Springer, (2004)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)BAT: Small and Fast KEM over NTRU Lattices., , , and . IACR Cryptol. ePrint Arch., (2022)Transparent Harddisk Encryption.. CHES, volume 2162 of Lecture Notes in Computer Science, page 273-285. Springer, (2001)SECOQC White Paper on Quantum Key Distribution and Cryptography, , , , , , , , , and 13 other author(s). CoRR, (2007)Did Filiol Break AES ?, , , , and . IACR Cryptology ePrint Archive, (2003)Optimizing MAKWA on GPU and CPU.. IACR Cryptology ePrint Archive, (2015)Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers., , , , , , , , , and 4 other author(s). IACR Cryptology ePrint Archive, (2009)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , and . J. Cryptology, 20 (1): 115-149 (2007)